[iptables PATCH 05/16] man: Use HTTPS for links to netfilter.org

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The browser is redirected there anyway, but who cares about such minor
details nowadays.

Reported-by: debian@xxxxxxxxxxxxx
Signed-off-by: Phil Sutter <phil@xxxxxx>
---
 extensions/libxt_nfacct.man | 2 +-
 iptables/iptables.8.in      | 4 ++--
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/extensions/libxt_nfacct.man b/extensions/libxt_nfacct.man
index b755f9770451c..a818fedd6b1ac 100644
--- a/extensions/libxt_nfacct.man
+++ b/extensions/libxt_nfacct.man
@@ -26,5 +26,5 @@ nfacct get http\-traffic
 .PP
 You can obtain
 .B nfacct(8)
-from http://www.netfilter.org or, alternatively, from the git.netfilter.org
+from https://www.netfilter.org or, alternatively, from the git.netfilter.org
 repository.
diff --git a/iptables/iptables.8.in b/iptables/iptables.8.in
index c83275b294872..71a6251d6b00c 100644
--- a/iptables/iptables.8.in
+++ b/iptables/iptables.8.in
@@ -419,7 +419,7 @@ allocation or error messages from kernel cause an exit code of 4. Finally,
 other errors cause an exit code of 1.
 .SH BUGS
 Bugs?  What's this? ;-)
-Well, you might want to have a look at http://bugzilla.netfilter.org/
+Well, you might want to have a look at https://bugzilla.netfilter.org/
 \fBiptables\fP will exit immediately with an error code of 111 if it finds
 that it was called as a setuid-to-root program.
 iptables cannot be used safely in this manner because it trusts
@@ -463,7 +463,7 @@ not in the standard distribution,
 and the netfilter-hacking-HOWTO details the netfilter internals.
 .br
 See
-.BR "http://www.netfilter.org/"; .
+.BR "https://www.netfilter.org/"; .
 .SH AUTHORS
 Rusty Russell originally wrote iptables, in early consultation with Michael
 Neuling.
-- 
2.40.0




[Index of Archives]     [Netfitler Users]     [Berkeley Packet Filter]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux